|United States Patent||6,658,004|
|Kadansky , et al.||December 2, 2003|
A method and apparatus for identifying a data message that is eligible for discard. A beacon node periodically transmits a beacon message to a plurality of client nodes communicatively coupled via a network. Each beacon message includes a beacon sequence number and preferably, the beacon sequence numbers are authenticated by the beacon, node. The client nodes, upon receipt of the beacon messages, verify the authenticity of the respective received beacon sequence numbers and generate a local sequence number derived from the received beacon sequence number. When one client in the session has data to transmit to another client in the session, the sending client assembles a data message and inserts its local sequence number in the data message prior to transmission of the data message to the other client nodes in the session. The client nodes receiving the data message discard the data message if their respective local sequence number at the time of receipt of the data message exceeds the local sequence number inserted in the data message by a predetermined value. In one embodiment, the beacon node generates sequence numbers at a periodic interval P but only transmits 1 out of every m beacon sequence numbers to the client nodes in the session. The client nodes each set a local sequence counter equal to the beacon sequence number upon receipt of the beacon message and thereafter, increment the local sequence counter periodically at interval P. The local sequence counter value is employed as the local sequence number in each client node.
|Inventors:||Kadansky; Miriam C. (Westford, MA), Chiu; Dah Ming (Acton, MA), Hanna; Stephen R. (Bedford, MA), Hurst; Stephen A. (Nashua, NH), Perlman; Radia J. (Acton, MA), Wesley; Joseph S. (Quincy, MA)|
Sun Microsystems, Inc.
|Filed:||December 28, 1999|
|Current U.S. Class:||370/394 ; 709/203|
|Current International Class:||H04L 12/56 (20060101); H04L 12/18 (20060101); H04L 29/08 (20060101); H04L 012/28 ()|
|Field of Search:||709/203,204 370/234,235,394,260|
|5799318||August 1998||Cardinal et al.|
|6085225||July 2000||Nakajima et al.|
|WO 00/01123||Jan., 2000||WO|
Lecture Notes in Computer Science, Dieter Gollman (Ed.), Computer Security, Nov., 1994. .
Membership Protocols for Distributed Conferece Control, Bala Rajagopalan, Computer Communications, vol. 18, No. 10, pp. 695-708, Oct., 1995. .
Efficient Security for Large and Dynamic Multicast Groups, Gernano Caronni, Marcel Waldvogel, Dan Sun, Bernhard Plattner, XP-002161662, pp. 376-383, IEEE 1998. .
Light-weight Reliable Multicast Protocol Specification, Tie Liao, Internet Draft, Oct. 13, 1998..